Month: September 2018

VC firms haven’t been the only ones raising hundreds of millions of dollars to invest in a booming market. After 15+ years of being the last industry anyone wanted to invest in, the music industry is coming back, and money is flooding in to buy up the rights to popular songs. As paid streaming subscriptions

A call for new cybersecurity leadership came from Massachusetts governor Charlie Baker at yesterday’s 2018 Massachusetts Cybersecurity Forum. Hosted by Gov. Baker, the forum brought together more than 200 of the state’s foremost practitioners from the public and private sectors. The forum included thought leaders from cybersecurity companies, universities and research and development centers to

by Lisa Vaas WhatsApp cofounder Brian Acton has revealed that he left the Facebook-acquired company 10 months ago because Facebook wanted to do things that made him squirm. He told Forbes: It was like, okay, well, you want to do these things I don’t want to do. It’s better if I get out of your way.

Another day, another Facebook story. In May, a Facebook Messenger malware named FacexWorm was utilized by cybercriminals to steal user passwords and mine for cryptocurrency. Later that same month, the personal data of 3 million users was exposed by an app on the platform dubbed myPersonality. And in June, millions of the social network’s users

ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk Given our growing digital dependency, cybersecurity incidents and the exploitation of security soft spots can have serious and cascading ramifications for businesses and their customers. Recent history has seen no shortage of high-profile cyberattacks and data breaches, giving

Logged out from your Facebook account automatically? Well you’re not alone… Facebook just admitted that an unknown hacker or a group of hackers exploited a zero-day vulnerability in its social media platform that allowed them to steal secret access tokens for more than 50 million accounts. UPDATE: 10 Important Updates You Need To Know About

Since McKinsey released a report on how best to use prizes to incentivize innovation nearly a decade ago, an entire industry has grown around social innovation challenges. The formula for these “save the world” competitions has become standard. Drum up a lot of buzz around an award. Partner with big names to get funding and

Employee monitoring to protect against data loss and misuse is becoming mandatory in more industries, but insider security is harder than ever to enforce. As more regulations around data privacy and missteps at high-profile companies generate ongoing headlines, security teams attempt to monitor insider threats without stepping into the quagmire. Teramind, a startup in Miami

At a Senate hearing this week in which US lawmakers quizzed tech giants on how they should go about drawing up comprehensive Federal consumer privacy protection legislation, Apple’s VP of software technology described privacy as a “core value” for the company. “We want your device to know everything about you but we don’t think we should,” Bud

Facebook has issued a password reset for around 90 million users, after a flaw was found in Facebook’s code that impacted “View As”, a feature that lets people see what their own profile looks like to someone else. According to a statement by Guy Rosen, VP of product management at Facebook, the flaw was discovered

by Anna Brading Facebook has suffered a data breach affecting almost 50 million accounts. Another 40 million have been reset as a “precautionary step”. What’s happened? In a post on the site earlier today, Facebook’s VP of Product Management, Guy Rosen, said that the breach was discovered on Tuesday 25 September 2018. Attackers exploited a

Don’t we all kinda secretly hope, even pretend, that our biggest fears are in the process of remedying themselves? Like believing that the police will know to stay close should we wander into a sketchy part of town. Or that our doors and windows will promptly self-lock should we forget to do so. Such a

The timing of the attacks suggests that many attempts to take the networks offline may not necessarily be perpetrated by organized cybercriminal gangs Students and staff are suspected to be behind many distributed denial-of-service (DDoS) attacks at colleges and universities in the United Kingdom, recent research suggests. The non-profit Jisc – which among other things

If you also found yourself logged out of Facebook on Friday, you are not alone. Facebook forced more than 90 million users to log out and back into their accounts in response to a massive data breach. On Friday afternoon, the social media giant disclosed that some unknown hackers managed to exploit three vulnerabilities in

Even if you never log into Facebook itself these days, the other apps and services you use might be impacted by Facebook’s latest big, bad news. In a follow-up call on Friday’s revelation that Facebook has suffered a security breach affecting at least 50 million accounts, the company clarified that Instagram users were not out

Lyft has released its second annual diversity report outlining the gender and racial breakdown of its 4,000-person workforce. At a glance, little has changed from last year’s report, which was the first time the $15 billion ride-hailing company disclosed its diversity stats. Forty percent of Lyft’s workforce is female, a slight decrease from last year’s 42 percent,

Congress and national security leaders have been urged to take action to address issues in voting machines. After DEF CON’s Voting Village came under fire from the National Association of Secretaries of State (NASS) over the introduction of an area designed to test voting machines, DEF CON’s report on the voting village said that Congress

by Paul Ducklin If you’ve heard of cryptocurrency – and who hasn’t these days? – you’ve probably heard of “the blockchain”. Technically, of course, the phrase the blockchain refers to any number of different blockchains – each cryptocurrency typically has its own – and we use the word in much the same way that we

Getting ahead in your career doesn’t happen by accident. It requires planning and constant pursuit. That’s why working for a company that invests in you, truly wants you to succeed and enables you to grow personally and professionally makes a big difference in your career progression. This week McAfee hosted our first-ever CMO Development Forum

The flaw affected one of the platform’s APIs between May 2017 and September 10 of this year, when it was patched “within hours” Twitter has fixed a bug that is believed to have shared Direct Messages (DMs) and protected Tweets of some users with developers who were not authorized to access that information. According to

A cybersecurity researcher with Google Project Zero has released the details, and a proof-of-concept (PoC) exploit for a high severity vulnerability that exists in Linux kernel since kernel version 3.16 through 4.18.8. Discovered by white hat hacker Jann Horn, the kernel vulnerability (CVE-2018-17182) is a cache invalidation bug in the Linux memory management subsystem that

WikiLeaks has a new top dog. Its contentious figurehead and founder Julian Assange will step aside, letting former WikiLeaks spokesperson Kristinn Hrafnsson take the reins due to what WikiLeaks calls “extraordinary circumstances” that have seen Assange “held incommunicado.” Assange created the organization in 2006 and has served as its editor-in-chief ever since. Hrafnsson, an Icelandic

It’s official. Two weeks ago, we reported that Opendoor — the four year-old, San Francisco-based company aiming to make it possible to buy and sell residential real estate with a few key strokes — was close to sealing up funding from SoftBank. Today, it’s announcing that the ink is dry on the deal. The terms: SoftBank’s massive Vision

If you own a smart TV, or even just a computer, it’s likely you have a Netflix account. The streaming service is huge these days – even taking home awards for its owned content. So, it’s only natural cybercriminals are attempting to leverage the service’s popularity for their own gain. In fact, just discovered last

New research from O’Reilly Media has revealed that almost nine out of 10 (86%) businesses are deploying machine learning technologies without considering important questions regarding data quality, consumer privacy and the quality of machine learning applications. The firm conducted its research among 2000 senior business leaders in the EU, discovering that over half (55%) of

by Mark Stockley The final swipe in the great whack-a-mole game of web encryption may finally have been swung. It hasn’t struck home yet but the backswing looks good and the aim is true. Behind the bat is Cloudflare – who else? – and its target is an obscure but widely used technology called SNI

ESET researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans as well as in Central and Eastern Europe UEFI rootkits are widely viewed as extremely dangerous tools for implementing cyberattacks, as they are hard to detect and able to survive security

The same day Apple released its latest macOS Mojave operating system, a security researcher demonstrated a potential way to bypass new privacy implementations in macOS using just a few lines of code and access sensitive user data. On Monday, Apple started rolling out its new macOS Mojave 10.14 operating system update to its users, which

NASA has issued a report summarizing its official plans for exploring our solar system, and it makes for exciting reading — if you don’t mind that it comes with a dose of realism. Crewed missions to the moon’s surface; a semi-permanent base orbiting it; a Mars sample return mission; all these and more are there,

In its early days, Microsoft Windows Defender, a lightweight, antimalware tool built into Windows, faced some stigma from IT professionals who didn’t think it brought anything special to the table. The doubters did not believe that Windows Defender features could detect a lot of the malware it was exposed to. Over the years, however, from